VPN Implementation


There is no specific definition for virtual private network (VPN). But most commonly definition is, VPN is a private network over the public network that been controlled or remote by certain organization. VPN also been known as the technologies that provides a secured private network between two host in a public network like internet. Usually, its cooperate with the Internet Services Provider (ISPs) that supply the publicly accessible network services to securely connected between public networks and nodes. VPN use the cryptography that provide user level of authentication, encryption and other security method to ensure that only authorized user can access the private network and the data communication and transmission process in the private network can’t easily been intercept by intruders. This security method been applied by VPN because of this technologies relies on the internet in data transmission. By have the security, user can access the private network securely from anyway as long as there have the internet connection.


Besides provide user’s with the secure data transmission, VPN can reduced the cost by replace the recent technologies that use the leased lines and remote access server and also its can reduced equipment and training cost and help the organization flexible and enable it to respond faster to changes in the marketplaces (David C. Chou et al, 2005). The way that VPN used to reduce the entire problem in the recent years is by using the private leased line such as internet as the medium for data transmission and accessing. In term of quality of services (QOS), some Internet Services Provider (ISP) now offered to organization the quality of VPN such as migration from using wide area network (WAN) to VPN. Earlier, many organizations used the leased lines, frame relay and T1 lines for connection implementation of wide area network (WAN).


VPN technologies can replaces existing private data network by helping relieve the data load to the private network, handle new software applications without disturbing the existing private data network or allow the new locations to be easily added to the network. A typical VPN connects one or more private network together through internet in which the network on each side of the internet has a gateway and a leased line connecting the network to the internet (Paulsen et al, 2000).
Unauthorized and often malicious access to private networks such as organization, staff, student or civilians in urban who need the remote access from an internet connection point to the private computer network are the target people that always use the VPN technologies. The analogy is like, once the VPN connection is established, the end user are virtually appears to be directly connected to the private network with all the access are been granted. Others, the end user nodes appears to have a local internet protocol (IP) address, which is required to access some specific applications. The VPN will be use only when those individuals who need access to private server or restricted service for example library system in a campus network.

Back